vendor:
zml.cgi
by:
Unknown
3.3
CVSS
MEDIUM
Directory Traversal
22
CWE
Product Name: zml.cgi
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Unix, Apache, Perl
2002
Directory Traversal Vulnerability in zml.cgi
zml.cgi is a perl script which can be used to support server side include directives under Apache. It accepts as a parameter the file to parse for these ssi directives. This parameter is susceptible to the standard ../ directory traversal attack, allowing arbitrary files to be specified. Although the script attempts to append a .zml extension to any file accessed, appending a null byte to the file name parameter is sufficient to evade this restriction.
Mitigation:
Ensure that the file parameter is properly sanitized and that the script does not accept any user input.